Title :
Man-in-the-middle attack on BB84 protocol and its defence
Author :
Wang Yong ; Wang Huadeng ; Li Zhaohong ; Huang Jinxiang
Author_Institution :
Coll. of Comput. & Control, Guilin Univ. of Electron. Technol., Guilin, China
Abstract :
Man-in-the-middle attack on the BB84 protocol is presented. The man in the middle can intercept the message from the sender and send his message to the receiver in every step of the BB84 protocol. The attack can be analogously used on other quantum key distribution schemes. Some methods are suggested to defense against the attack by discovering the attack or handicapping the attack, and the security of BB84 protocol is analyzed.
Keywords :
cryptographic protocols; quantum cryptography; BB84 protocol; man-in-the-middle attack; quantum key distribution scheme; Cryptographic protocols; Cryptography; Detectors; Distributed computing; Educational institutions; Information security; Information technology; Physics; Quantum computing; Teleportation; BB84 protocol; man-in-the-middle attack; quantum cryptography; quantum key distribution;
Conference_Titel :
Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-4519-6
Electronic_ISBN :
978-1-4244-4520-2
DOI :
10.1109/ICCSIT.2009.5234678